Veracode is an application security company based in Burlington, Massachusetts. Founded in 2006, the company provides an automated cloud-based service for securing web, mobile and third-party enterprise applications. Veracode provides multiple security analysis technologies on a single platform, including static analysis, dynamic analysis, mobile application behavioral analysis and software composition analysis.

Wikipedia
Veracode
Veracode
Blog Post
  • Veracode just published its latest “State of Software Security” report, get it here. Based on Veracode Platform data, these “SoSS” reports have been offering a goldmine of intelligence about how organizations are approaching AppSec since 2011. This year’s report is no different. Evan Schuman recently sat down with Veracode’s Director of Product Management Tim Jarrett to discuss the findings emerg...

Veracode
Veracode
Blog Post
  • In the past year, we’ve seen an unprecedented series of cyber assaults on democratic elections, ransomware attacks that spread around the world affecting hundreds of thousands of systems in more than 150 countries, and record-breaking data breaches. If we’re going to address this growing crisis effectively, we need a probing inspection of root causes, and fearless prescriptions for new ways forwa...

Veracode
Veracode
Blog Post
  • Over the summer, some friends at Veracode approached me and asked if I would be willing to help them with an experiment. Could I, they wanted to know, spend an entire day neither using nor leveraging any software whatsoever. They bet me that I couldn’t. I love a challenge as much as any journalist so I said “Sure. How hard could it possibly be?” The point of this is to make business people better...

Veracode
Veracode
Blog Post
  • As development speed has skyrocketed, security testing has shifted “left,” where it increasingly falls within the realm of the developer, rather than the security team. Today, modern application security programs feature centralized governance by security, but testing and fixing are owned by development in an automated fashion throughout the build process. In this approach, security owns setting ...

Veracode
Veracode
Blog Post
  • More than you might think. Just as the reliance on a single species of vulnerable-to-blight potato created widespread devastation in 1800s Ireland, today’s reliance on vulnerable components creates a similar ripple effect. In both cases, compromise of a single vulnerability spread its consequences widely and rapidly. The Potato Famine’s consequences were obviously more devastating, but although d...

Veracode
Veracode
Blog Post
  • Recent research by Wordfence indicates that Wordpress might be the next big ransomware target. Wordfence found that certain Wordpress plugins exhibit malicious behaviour in the form of ransomware against the host website. Typically, these plugins will encrypt the data on the website, thereby rendering it non-functional, and then attempt to extort payment from the owner in order to decrypt the web...

Veracode
Veracode
Blog Post
  • We’re excited to announce the public launch of our new Veracode Community – a central destination for developers and security professionals to exchange best practices, and discuss trends in AppSec and secure development. As businesses continue to increase their reliance on software, you’re feeling pressure for faster version releases, while simultaneously reducing the risk of a breach. The Veraco...

Veracode
Veracode
Blog Post
  • Whenever there’s a major data breach announced in the news, I think about how there must be other breaches happening that we don’t even know about. Because, although cyberattackers frequently target known vulnerabilities in software, the victims are unlikely to know they were vulnerable until it is too late. As today’s software is increasingly assembled from bits and pieces of open source and thi...

Veracode
Veracode
Landing Page

The Top 5 Most Prevalent Web Application Vulnerabilities

 
Veracode
Veracode
Blog Post
  • The AppSec Skills Gap Is Widening Nearly 20% A Year. Here's How We Fix It. A recent survey from Veracode and DevOps.com found that the majority of IT and development professionals weren’t required to take security courses in college – and they’re not receiving the necessary training from their employers. So, we have to ask: where does the fault lie? Should universities ramp up their security educ...

Veracode
Veracode
Blog Post
  • As software increasingly plays a critical role in how organizations conduct business, we are seeing two trends emerge: 1. Organizations want more software produced faster. 2. Cyberattackers are finding software a more attractive target. For developers, all the above means that their jobs are changing. The need to get software out the door faster has led to a shift to DevSecOps – where software is...

Veracode
Veracode
Landing Page

How Do Vulnerabilities Get Into Software | Veracode

 
Veracode
Veracode
Landing Page

Veracode Email Subscription Management

 
Veracode
Veracode
Landing Page

Veracode Email Subscription Management

 
Veracode
Veracode
Landing Page

New mobile optimized landing page detected

 
Veracode
Veracode
Landing Page

New mobile optimized landing page detected

 
Veracode
Veracode
Landing Page

Gain Visibility Into Your Open Source Risk With Veracode Software Composition | Veracode

 
Veracode
Veracode
Landing Page

New mobile optimized landing page detected

 
Veracode
Veracode
Landing Page

Struts-Shock: Current Attacks Against Struts 2 and How to Defend Against Them | Veracode

 
Veracode
Veracode
Landing Page

New mobile optimized landing page detected

 
Veracode
Veracode
Landing Page

Getting Started with Secure DevOps | Veracode

 
Veracode
Veracode
Landing Page

New mobile optimized landing page detected

 
Veracode
Veracode
Landing Page

Integrating Appsec Into the Tools You Already Use Webinar | Veracode

 
Veracode
Veracode
Landing Page

Gartner Magic Quadrant Webinar | Veracode

 
Veracode
Veracode
Landing Page

New mobile optimized landing page detected

 
Veracode
Veracode
Landing Page

The Top 4 Ways Vulnerabilities Get Into Your Software | Veracode

 
Veracode
Veracode
Landing Page

New mobile optimized landing page detected

 
Veracode
Veracode
Landing Page

How to Ensure Your Code Meets Policy Compliance | Veracode

 

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.